Preferred Language
Articles
/
alkej-137
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
The Effect of The Illustration Program on Fashion Design Inspired by Historical Costumes: تهاني ناصر العجاجي -هدى عبد العزيز المقرن
...Show More Authors

This research aims to identify the role and impact of illustrations in contemporary fashion design inspired by historical costumes. Historical fashion aesthetics are adapted to design drawings. The experimental method was followed and a sample of 31 students in the department of fashion and textile design, third level were selected. Each student carried out two original historical and contemporary design. The models were executed two times: one with the usage of the program and the other without program help. The tools that were used are the program, the scale, the pre-skill test, and the post-skill test. One of the most relevant results of the research is the possibility of using historical costumes to highlight creativity and innovatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Obstacles to Administrative Creativity of Female Leaders in Secondary Schools (Curriculum System) in the Northern Border Region in Saudia Arabia
...Show More Authors

The study aimed to reveal the obstacles of administrative creativity among the leaders of secondary schools (the curriculum system) in the northern border region, which relate to the obstacles (organizational, motivational, and psychological). In addition, to identify the most important statistical differences between the responses of the members of the study sample, which attribute to the variables (educational qualification, year’s Administrative expertise). To achieve the goal of the study, the researcher used the descriptive analytical approach, and to verify the validity of the tool, it has presented to several referees and faculty members in the educational field. The validity of the internal consistency was also calculated for t

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Idealism and Realism in The Design: A Comparative Study
...Show More Authors

At the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Aquatic Oligochaeta (Annalida:Clitellata) as Bio Indication for Sediment Quality Assessment in Tigris River Within Baghdad City /Iraq
...Show More Authors

Aquatic Oligochaeta is an important group of Macroinvertebrates that has been very remarkable as bioindicators for assessing water pollution and determining its degree in water bodies. Hence, the idea of the current study aims at studying the impact of Baghdad effluents on the Tigris River by using oligochaetes community as bioindicators . For this purpose, four sites along the inside of Baghdad has been chosen. Site S1 has been located upstream, site S2 and S3 has been at midstream and site S4 at the downstream of the River.This investigation has used different types of biological indicators, including the  percentage of oligochaeta  within benthic invertebrates, which ranged from 49.2-51.28%. The highest percentage of the tubificid w

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry of the fifth scientific students
...Show More Authors

The research aimed to identify the effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry at the fifth scientific students at a secondary school of the General Directorate for Educational in Diyala / Baladruz in Iraq. The research sample Consisted of (57 student, (29) students as experimental group studied according to instructional design strategies for whole brain theory of Herrmann and (28) a student as a control group studied by the usual way for two semesters, a prepared achievement test as article and objective type of multiple choice, the coefficient stability of alpha-Cronbach equation reached (0.86). The research Results showed the presence of a statistically significant d

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
العنف ضد المرأةدراسة ميدانية في مدينة بغداد
...Show More Authors

      لطالما تحاشينا الخوض في الحديث عن المرأة , وكل ما يتعلق بها من موضوعات , خصوصا في سياق ما يطرح حولها من أمور كأنها لاتخص غيرها مثل : " الحرية "   "والمساواة "  " والحقوق " ... وغيرها من المواضيع التي تعج بها الكتب والشاشات والبرامج والمؤتمرات والندوات , التي غالبا ما ترفع فيها الشعارات المؤدلجة وتوضع اخرى , في أتون محموم , إن دل على شيئ فانه يدل بالدرجة الاولى عن مدى الفوضى الفكرية التي نعي

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Arab Science Heritage Journal
التحالف التحالف الصليبي المغولي ضد العالم الإسلامي
...Show More Authors

The Crusade-Mongol alliance against the Islamic World represents one of the most serious issues ever experienced by the Islamic World and the challenges ever faced by the Muslims during the Middle Ages. Having failed to win victory over Muslims when the Crusaders were about to withdraw and declare defeat, there appeared a force

View Publication Preview PDF